Transactions on Emerging Telecommunications Technologies最新文献

筛选
英文 中文
Innovative Video Anomaly Detection: TCN-AnoDetect With Self-Supervised Feature Learning
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-12-18 DOI: 10.1002/ett.70045
V. Rahul Chiranjeevi, D. Malathi
{"title":"Innovative Video Anomaly Detection: TCN-AnoDetect With Self-Supervised Feature Learning","authors":"V. Rahul Chiranjeevi,&nbsp;D. Malathi","doi":"10.1002/ett.70045","DOIUrl":"https://doi.org/10.1002/ett.70045","url":null,"abstract":"<div>\u0000 \u0000 <p>Video anomaly detection is a critical task in surveillance, industrial quality control, and anomaly monitoring systems. Recognizing anomalous events or behaviors within video sequences is challenging due to the diverse and often vague nature of anomalies. A novel temporal convolutional network-based anomaly detection (TCN-AnoDetect) is proposed that leverages TCNs and self-supervised learning. In this, TCNs are employed to model the temporal context within video sequences effectively, capturing short and long-term dependencies. The algorithm integrates TCNs with pretrained models to encode rich spatiotemporal features. The core of TCN-AnoDetect lies in self-supervised feature learning, where a neural network is pretrained on unlabeled video data to capture high-level spatiotemporal features. The anomaly detection module combines reconstruction-based and temporal context–aware approaches, using reconstruction errors and temporal context deviations for anomaly scoring and classification. To enhance model robustness, TCN-AnoDetect incorporates domain adaptation technique to handle domain shifts and evolving anomalies. The proposed algorithm is evaluated on three different benchmark datasets and ShanghaiTech Campus, demonstrating its superior performance. The extensive experiments performed in terms of different evaluation measures show the efficiency of the TCN-AnoDetect algorithm. The TCN-AnoDetect, an innovative approach, thereby provides promising solutions in video anomaly detection and in various applications.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142861423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel Estimation for IRS-Aided OTFS System Using Dilated Attention GAN 利用稀释注意力广义模糊网络为 IRS 辅助 OTFS 系统进行信道估计
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-12-12 DOI: 10.1002/ett.70031
Shatakshi Singh, Aditya Trivedi, Divya Saxena
{"title":"Channel Estimation for IRS-Aided OTFS System Using Dilated Attention GAN","authors":"Shatakshi Singh,&nbsp;Aditya Trivedi,&nbsp;Divya Saxena","doi":"10.1002/ett.70031","DOIUrl":"https://doi.org/10.1002/ett.70031","url":null,"abstract":"<div>\u0000 \u0000 <p>This paper presents a channel estimation method for an intelligent reflecting surface (IRS)-aided orthogonal time-frequency spacing (OTFS) system in a dynamic scenario. Current channel estimation techniques for IRS-aided OTFS systems are built upon explicit channel model assumptions, which can constrain their adaptability in intricate environments. Furthermore, their reliance on pilot signals introduces significant pilot overhead in high-speed scenarios. To address these issues, we propose a dilated attention generative adversarial network (DAGAN) that has a novel architecture for capturing long-range dependency among data symbols separated in the delay-Doppler (DD) domain for estimating channels. Furthermore, the DAGAN includes an attention block to extract essential features from data symbols for channel information generation. This mechanism is guided by least square (LS) estimates of specific DD paths, serving as additional information for the DAGAN. Experimental results illustrate that the DAGAN method performs the best with the least NMSE with limited pilot overhead in comparison to other methods.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142860863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to A Secure and Decentralized Authentication and Data Transmission in Internet of Vehicles Using Blockchain and Ring-Based Cryptosystem
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-12-11 DOI: 10.1002/ett.70032
{"title":"Correction to A Secure and Decentralized Authentication and Data Transmission in Internet of Vehicles Using Blockchain and Ring-Based Cryptosystem","authors":"","doi":"10.1002/ett.70032","DOIUrl":"https://doi.org/10.1002/ett.70032","url":null,"abstract":"<p>D. Ranganayakulu, N. Jesubert Thangaraj, S. P. Shanmugam, and B. Subbiyan, “A Secure and Decentralized Using Blockchain and Ring-Based Cryptosystem,” <i>Transactions on Emerging Telecommunications Technologies</i>, 35 (2024): e70012, https://doi.org/10.1002/ett.70012.</p><p>We apologize for this error.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.70032","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Adaptive Learning-Based Beam Combining Framework for 5G Millimeter-Wave Massive 3D-MIMO Uplink Systems
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-12-02 DOI: 10.1002/ett.70030
K. Mahendran, H. Sudarsan, S. Rathika, B. Shankarlal
{"title":"Deep Adaptive Learning-Based Beam Combining Framework for 5G Millimeter-Wave Massive 3D-MIMO Uplink Systems","authors":"K. Mahendran,&nbsp;H. Sudarsan,&nbsp;S. Rathika,&nbsp;B. Shankarlal","doi":"10.1002/ett.70030","DOIUrl":"https://doi.org/10.1002/ett.70030","url":null,"abstract":"<div>\u0000 \u0000 <p>In today's wireless communication systems, the integration of 5G millimeter-wave (mmWave) Massive Multiple Input–Multiple Output (M-MIMO) technology offers significant advancements and capabilities that address the growing demand for higher data rates, increased capacity, and improved user experiences. In three-dimensional (3D) environments, the design of beamforming for uplink multi-user M-MIMO relies on accurate uplink channel state information (CSI) at the transmitter/receiver. In fact, it is difficult for the Base Station (BS) and the User Equipment (UE) to obtain beam patterns due to computational complexity, multiple 3D beams, and regulating the weight of antenna elements, which leads to significantly low sum-rate. Hence, a robust, deep adaptive learning framework in the case of 3D beamforming is needed. This paper proposes a deep adaptive learning-based beam combining framework using User-Wise Attention-Assisted Deep Adaptive Neural Network (UWA-DANN) for mmWave-3DM-MIMO systems. In this, a UWA mechanism learns a set of beam features and corresponding weights for each user. This mechanism allows the system to focus on different users independently and adapt the beamforming process accordingly. Also, it allows the network to dynamically focus on relevant information from the input channels and user constraints. To this end, a dynamic beam pattern is adapted using the DANN model to learn user positions, channel measurements, and beamforming weights. This approach learns to map input parameters such as user positions, channel measurements, and corresponding beam patterns to extract relevant features for beam pattern adaptation. Thus, the UWA-DANN approach provides higher data rates, low complexity, and improved link stability for users. Experimental results show that the proposed UWA-DANN model obtains robust performance over existing schemes in terms of achievable rate and sum-rate under field trial sites in urban scenarios.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142762168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconfigurable Intelligent Surface-Aided MIMO Secure Communication System With Finite-Alphabet Inputs
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-29 DOI: 10.1002/ett.70029
Yingjie Wu, Shilian Wang, Junshan Luo, Weiyu Chen
{"title":"Reconfigurable Intelligent Surface-Aided MIMO Secure Communication System With Finite-Alphabet Inputs","authors":"Yingjie Wu,&nbsp;Shilian Wang,&nbsp;Junshan Luo,&nbsp;Weiyu Chen","doi":"10.1002/ett.70029","DOIUrl":"https://doi.org/10.1002/ett.70029","url":null,"abstract":"<div>\u0000 \u0000 <p>Existing research in the field of reconfigurable intelligent surface (RIS)-aided physical layer security assumed Gaussian signal inputs, which is inapplicable to practical communication systems, where finite-alphabet inputs are used. This paper considers an RIS-aided secure multiple-input multiple-output wireless communication system with finite-alphabet inputs, where artificial noise (AN) is invoked at the transmitter to enhance the secure performance. In order to maximize the secrecy rate (SR), the data precoder, the AN precoder, and RIS's reflection coefficients are jointly optimized subject to the constraints of the maximum transmit power and the finite resolution of the phase shifts of RIS. Particularly, due to the finite-alphabet input, the exact expression of the SR involves multiple integrals and lacks a closed-form expression. To tackle this, a closed-form lower bound of the SR is derived as the objective function, which is theoretically proved to be equal to the SR in the high signal-to-noise ratio region. Numerical results show that the RIS can significantly improve the secure performance, and the maximum possible SR (due to the finite-alphabet inputs) can be achieved by increasing the number of the RIS's elements or by increasing the transmit power, which shows the performance advantage of the proposed optimization algorithm.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142758078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Cloud Computing Paradigm: A Survey of Operational Concerns, Challenges and Open Issues 移动云计算范例:运营关注点、挑战和未决问题调查
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-27 DOI: 10.1002/ett.70020
Higinio Mora, Francisco A. Pujol, Tamai Ramirez-Gordillo, Antonio Jimeno
{"title":"Mobile Cloud Computing Paradigm: A Survey of Operational Concerns, Challenges and Open Issues","authors":"Higinio Mora,&nbsp;Francisco A. Pujol,&nbsp;Tamai Ramirez-Gordillo,&nbsp;Antonio Jimeno","doi":"10.1002/ett.70020","DOIUrl":"https://doi.org/10.1002/ett.70020","url":null,"abstract":"<p>The Mobile Cloud Computing paradigm has revolutionized the concepts of mobile computing and the Internet of Things (IoT). This paradigm allows outsourcing the workload of mobile devices, or other connected “things,” to be computed in the Cloud. Currently, outsourcing possibilities have been widely developed making available computing platforms at different network layers. In a consequence of that, a virtual increasing of the performance and a homogenization of the computing capabilities of the devices are produced. The research described in this work presents a review of the state of the art about recent works, the main operational concerns, challenges, and open issues of this paradigm in order to update the border of knowledge on this topic. As a result, a critical analysis is conducted, and new research directions are discussed. The findings provide value-added to the scientific community and, therefore it could be helpful for other researches in these topics, especially given the rising popularity of IoT platforms.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.70020","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142737612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of UAVs and FANETs in Disaster Management: A Review on Applications, Challenges and Future Directions 无人机与 FANET 在灾害管理中的整合:应用、挑战和未来方向综述
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-27 DOI: 10.1002/ett.70023
Sohail Abbas, Manar Abu Talib, Ibtihal Ahmed, Omar Belal
{"title":"Integration of UAVs and FANETs in Disaster Management: A Review on Applications, Challenges and Future Directions","authors":"Sohail Abbas,&nbsp;Manar Abu Talib,&nbsp;Ibtihal Ahmed,&nbsp;Omar Belal","doi":"10.1002/ett.70023","DOIUrl":"https://doi.org/10.1002/ett.70023","url":null,"abstract":"<div>\u0000 \u0000 <p>Rapid growth and technological improvement in wireless communication, driven by engineers from various disciplines, have reached significant milestones. Unmanned Aerial vehicles (UAVs) and flying ad hoc networks (FANET) have undergone one of the biggest innovations. UAVs have drawn a lot of attention from research institutions. They are increasingly employed in various application fields, such as real-time monitoring, precision farming, wireless coverage, military surveillance, climate monitoring, disaster surveillance, and monitoring and rescue operations. The primary characteristics of disasters are their unpredictability and the scarcity of resources in the affected areas. To reduce the loss of lives and livelihoods, disaster management has received much attention. Numerous methodologies and technologies have been developed to predict and handle disasters. UAVs are increasingly being used in disaster management. Additionally, artificial intelligence and collaborative machine learning techniques are gaining prominence among researchers, who are investigating the possibility of their use in disaster management tasks to better cope with the severe and frequently devastating effects of natural catastrophes. This paper provides a review of the relevant FANET research activities in disaster management and emerging artificial intelligence techniques, along with several observations and research challenges. The papers are categorized based on the disaster scenario-related problems and their proposed solutions. FANET problems are receiving less attention from the research community, and the main challenges with FANETs are also highlighted. Finally, significant insights are presented that can aid in improving research related to the application of FANETs in disaster management.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142724208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DRL-Based Computation-Efficient Offloading and Power Control for UAV-Assisted MEC Networks 基于 DRL 的计算高效卸载和功率控制,适用于无人机辅助的 MEC 网络
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-23 DOI: 10.1002/ett.70027
B. Priya, J. M. Nandhini, S. Uma, K. Anuratha
{"title":"DRL-Based Computation-Efficient Offloading and Power Control for UAV-Assisted MEC Networks","authors":"B. Priya,&nbsp;J. M. Nandhini,&nbsp;S. Uma,&nbsp;K. Anuratha","doi":"10.1002/ett.70027","DOIUrl":"https://doi.org/10.1002/ett.70027","url":null,"abstract":"<div>\u0000 \u0000 <p>Mobile edge computing (MEC) has achieved significant attention due to the availability of computational tasks in specific scenarios such as emergency applications like forest fire and earthquake remedies. The computationally demanding policy and user offloading policy are challenging problems to address in the energy constrained unmanned aerial vehicle (UAV) network. In this work, the computational task offloading, and power management is solved by using the multi-agent deterministic power management algorithm (MADPM) based on deep reinforcement learning. Every UAV works together as a team to understand the actor critic environment and to make decisions that will help achieve the goals. This involves transferring computational tasks from UAVs to more powerful ground stations or other UAVs to save energy and enhance performance. It requires intelligent decision-making to determine which tasks to offload and when. The joint optimization problem is verified with the simulation results and the proposed work is enabled with MEC in achieving the emergence of UAV related applications. Our simulations show that the MADPM algorithm, as suggested, enhances task offloading efficiency by 35% and reduces power consumption by 25% when compared with current methods. These findings underscore the ability of our method to greatly improve the UAV operational capacities.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142708224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Soft Actor-Critic Request Redirection for Quality Control in Green Multimedia Content Distribution 用于绿色多媒体内容分发质量控制的软代理-批评请求重定向
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-20 DOI: 10.1002/ett.70014
Pejman Goudarzi, Jaime Lloret
{"title":"Soft Actor-Critic Request Redirection for Quality Control in Green Multimedia Content Distribution","authors":"Pejman Goudarzi,&nbsp;Jaime Lloret","doi":"10.1002/ett.70014","DOIUrl":"https://doi.org/10.1002/ett.70014","url":null,"abstract":"<p>Nowadays, network resource limitations which are resulted from the increasing interest of greedy users for streaming video services, lead the network operators to use multimedia content distribution/delivery network (CDN) for distribution of user requests to the network edges and hence optimally use their resources. Due to the stochastic and uncertain nature of user request distributions and green energy suppliers (wind, solar, etc.), developing an optimal request redirection methodology that takes into account both maximizing total users' quality of experience (QoE) and energy cost minimization is a challenging issue. In this paper, a model-free soft actor-critic reinforcement learning algorithm has been developed for QoE enhancement of smart grid-enabled (green) content distribution networks. Contrary to the traditional CDNs, the achieved optimal request redirection policy, while maximizing the total QoE of the system, may redirect the users of a regional CDN point of presence to other (non-regional) PoPs due to real-time energy management mechanism associated with energy cost optimization constraints. We have performed extensive simulations on real electricity pricing data for validating the effectiveness of the proposed method and have compared it with similar approaches. The experimental results show that the proposed intelligent request routing method while preserving the same order of computational complexity, can achieve the energy cost savings up to 65% and improve the average total QoE of CDN users in comparison with similar methods.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.70014","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142692085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secrecy Performance of Full-Duplex Space-Air-Ground Integrated Networks in the Presence of Active/Passive Eavesdropper, and Friendly Jammer 存在主动/被动窃听器和友好干扰器时的全双工空地一体化网络的保密性能
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-20 DOI: 10.1002/ett.70024
Ayse Betul Buyuksar, Eylem Erdogan, Ibrahim Altunbas
{"title":"Secrecy Performance of Full-Duplex Space-Air-Ground Integrated Networks in the Presence of Active/Passive Eavesdropper, and Friendly Jammer","authors":"Ayse Betul Buyuksar,&nbsp;Eylem Erdogan,&nbsp;Ibrahim Altunbas","doi":"10.1002/ett.70024","DOIUrl":"https://doi.org/10.1002/ett.70024","url":null,"abstract":"<div>\u0000 \u0000 <p>In this paper, a full-duplex (FD) space-air ground integrated network (SAGIN) system with passive and active eavesdroppers (PE/AE) and a friendly jammer (FJ) is investigated. The shadowing side information (SSI)-based unmanned aerial vehicle relay node (URN) selection strategy is considered to improve signal-to-interference plus noise power ratio (SINR) at the ground destination unit. To quantify the secrecy performance of the considered scenario, outage probability (OP), interception probability (IP), and transmission secrecy outage probability (TSOP) are investigated in the presence of FJ and PE/AE. The results have shown that aerial AE is an important threat since it can severely degrade the OP of the main transmission link. Furthermore, the FJ can decrease the IP of the eavesdropper by causing interference with the cost of power consumption of URNs. Simulations are performed to verify the theoretical findings.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142685242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信